摘要:
An optical disc having a plurality of sectors, each of which includes a plurality of frames. Sub information bit value '0' or '1' is assigned to the plurality of frames constituting a sector, excluding the first and last frames. Edge positions are displaced so that leading/lagging errors appear in accordance with a certain rule when data fields of the frames to which sub information bit value '1' is assigned are read. Edge positions are displaced so that leading/lagging errors appear in accordance with a reversed rule of the certain rule when data fields of the frames to which sub information bit value '0' is assigned are read.
摘要:
An optical disk having such a data structure that moving image data and audio data are naturally reproduced under one title without stoppage (freeze), etc., of video display at the connections of system streams (VOB) in which the data are interleaved when the data are reproduced by connecting the system streams (VOB) to each other. At least the first audio frame (Af) contains the same audio data in a plurality of branched stream systems (VOB) and at least the last GOP contains the same moving picture in a plurality of system streams (VOB) before connected.
摘要:
Four ECC blocks are recorded in a burst cutting area of an optical disc. Each ECC block is constituted by a BCA content code of 1 byte, content data length of 1 byte, and content data of 14 bytes. Of the BCA content data, the leading 6 bits are used for application ID and the remaining 2 bits are used for block number. Disc ID is stored in the content data. Since the four ECC blocks exist, the optical disc can be managed individually by four applications at the maximum. Thus it becomes possible to manage the same optical disc by a plurality of applications.
摘要:
A content protection system prevents illegal key acquisition, without checking uniqueness of device keys. The content protection system includes a key data generation apparatus and a user terminal. The key data generation apparatus converts first key data, which is for using content, based on a predetermined conversion rule, thereby generating second key data, encrypts the second key data using a device key held by valid terminals, and outputs the encrypted key data. The user terminal obtains the encrypted key data, decrypts the encrypted key data using a device key held by the user terminal, thereby generating second key data, converts the second key data based on a re-conversion rule corresponding to the conversion rule, thereby generating the first key data, and uses the content with use of the generated first key data.
摘要:
A revocation list generation apparatus and a revocation judgement apparatus suppress the size of a CRL even if a number of public key certificates to be revoked increases.The revocation list generation apparatus, in which leaves in a tree structure correspond to public key certificates, which are identified by leaf identifiers, and nodes from a leaf that corresponds to a revoked public key certificate to a root are revoked, generates, for each revoked node excluding leaves, revocation information showing whether directly subordinate nodes are revoked, and generates a revocation list that includes a plurality of pieces of revocation information arranged in an particular order.The revocation judgement apparatus obtains the revocation list, attempts to construct a path from the root to the leaf, using the revocation information in the revocation list, and when the leaf is included in the constructed path, judges the obtained public key certificate is revoked.
摘要:
An input/output (IO) system reduces the processing load involved in judging whether a device is valid or revoked. The system is constituted from an input/output (IO) device and an information usage device. The IO device outputs an identifier (ID) list to the information usage device, the ID list including one or more identifiers (IDs), arranged according to a predetermined rule, that each correspond to a different valid or revoked device. The information usage device uses the received ID list to specify a target range that includes a target ID stored by the information usage device, and outputs range information indicating the specified target range to the IO device, which uses the received range information in judging whether the information usage device is valid or revoked.
摘要:
An optical disk is provided that disables reproduction of sub-information even if the sub-information as a contents encryption key is recorded entirely onto another optical disk. Sub-information is recorded on the optical disk by deforming a recording mark slightly in accordance with a pseudo random number sequence that is obtained using as an initial value medium ID that is read out medium inherent information. This allows sub-information inherent in a medium to be recorded, and even if the sub-information is duplicated entirely to another optical disk, the illegally duplicated sub-information cannot be reproduced because of a difference in initial value of a pseudo random number sequence between media.
摘要:
An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device comprise: a CRL memory unit 111 that memorizes a CRL, a device key ring memory unit 112 that memorizes a peculiar device key KD A in every IC card 210a used in a decrypting device 200a, a content key memory unit 113 that memorizes a content key Kc which is a secret key for decrypting content, a hashing function processing unit 114 that calculates a hashing value of the CRL memorized in the CRL memory unit 111, an Ex-OR unit 115 that carries out an exclusive OR between the hashing value and the device key KD A memorized in the device key ring memory unit 112, and an Enc unit 116 that encrypts the content key Kc memorized in the content key memory unit 113 with an output value of an Ex-OR unit 115.
摘要:
A revocation list generation apparatus and a revocation judgement apparatus suppress the size of a CRL even if a number of public key certificates to be revoked increases.The revocation list generation apparatus, in which leaves in a tree structure correspond to public key certificates, which are identified by leaf identifiers, and nodes from a leaf that corresponds to a revoked public key certificate to a root are revoked, generates, for each revoked node excluding leaves, revocation information showing whether directly subordinate nodes are revoked, and generates a revocation list that includes a plurality of pieces of revocation information arranged in an particular order.The revocation judgement apparatus obtains the revocation list, attempts to construct a path from the root to the leaf, using the revocation information in the revocation list, and when the leaf is included in the constructed path, judges the obtained public key certificate is revoked.